-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- ------------------------------------------------------------------------- Debian Security Advisory DSA-4887-1
security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff
April 08, 2021
https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : lib3mf
CVE ID : CVE-2021-21772
Debian Bug : 985092
A use-after-free was discovered in Lib3MF, a C++ implementation of the
3D Manufacturing Format, which could result in the execution of
arbitrary code if a malformed file is opened.
For the stable distribution (buster), this problem has been fixed in
version 1.8.1+ds-3+deb10u1.
We recommend that you upgrade your lib3mf packages.
For the detailed security status of lib3mf please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/lib3mf
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at:
https://www.debian.org/security/
Mailing list:
debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmBvSqgACgkQEMKTtsN8 TjZ1wA//YsD3ywg6c7X8IYZNKbU9G3ZkPtk1RdEa/i1JVB5Kr2yOTbK1g9a2Rxor FfpF0jPGTOkLVAIvkutmsvousI3S8z/KVYlooltJEG4DDeSryccyHKUzhLcVltXd YQiLnA3/ponzedFqO7xcktsSYHJOOZK6BVvV8hHZTn0VRfBzpNGKKv0xguHHP8hd eEet1Dp7ZiFAN0SxaSGyQf6dPSwz857ASyrzsqZ3HOoClOUAXg0uCxwpwLo6oE2D MYy9e8kWHs7ZtKK+sZdzdZQ+DvDKm6vZmhzdAVFnqhcnhMd57DdEi6RknL4uKym7 CgyN4nL+HVoLvIlwIkxefV5GPey3mcEkS2wZaG4vXCyXabKfrpDcOCKNLWcjsUMq 928q/MUJU4uBD/dSrHRnYHpqYaQsVTxgVySboRS4O+bklcbq0fsORZ3DOkkkw872 j2BpiqjBMrBtzhPNVCU6EghTNFHo0JCuuesCYCyorEsdkdLPh3GL3Np2zDnCd6PN UuOiQr4Jjjfk2HskKZOXxKcbdVQL8ox7S99pOURqx+95KpyUzhakY+jWusmXU8eL R4zDf7LoZxhh1R+O+Bl64YOLlkegHtxO8q835tseh77G4vfuu3FVKIb/HWJQzM4T 7JzvX4oajHIaYiKJLpXu3eo+HdJdjWfjH5FouV5GtpDJQUaqbpc=
=AmSX
-----END PGP SIGNATURE-----
--- SoupGate-Win32 v1.05
* Origin: fsxNet Usenet Gateway (21:1/5)